d-collapsibility is NP-complete for d 4
|
|
- Kevin Norton
- 6 years ago
- Views:
Transcription
1 d-collapsibility is NP-complete for d 4 Martin Tancer June 22, 2010 Abstract A simplicial complex is d-collapsible if it can be reduced to an empty complex by repeatedly removing (collapsing) a face of dimension at most d 1 that is contained in a unique maximal face. We prove that the algorithmic question whether a given simplicial complex is d-collapsible is NP-complete for d 4 and polynomial time solvable for d 2. As an intermediate step, we prove that d-collapsibility can be recognized by the greedy algorithm for d 2, but the greedy algorithm does not work for d 3. A simplicial complex is d-representable if it is the nerve of a collection of convex sets in R d. The main motivation for studying d-collapsible complexes is that every d-representable complex is d-collapsible. We also observe that known results imply that d-representability is NP-hard to decide for d 2. 1 Introduction Our task is to determine the computational complexity of recognition of d- collapsible simplicial complexes. These complexes were introduced by Wegner [Weg75] and studying them is motivated by Helly-type theorems, which we will discuss later. All the simplicial complexes 1 throughout the article are assumed to be finite. Department of Applied Mathematics and Institute for Theoretical Computer Science (supported by project 1M0545 of The Ministry of Education of the Czech Republic), Faculty of Mathematics and Physics, Charles University, Malostranské nám. 25, Prague, Czech Republic. Partially supported by project GAUK tancer@kam.mff.cuni.cz 1 We assume that the reader is familiar with simplicial complexes; introductory chapters of books like [Mat03, Hat01, Mun84] should provide a sufficient background. Unless stated otherwise, we work with abstract simplicial complexes, i.e., set systems K such that if A K and B A then B K. 1
2 1.1 Main results d-collapsible complexes. Informally, a simplicial complex is d-collapsible if it can be vanished by removing faces of dimension at most d 1 which are contained in unique maximal faces. A more detailed motivation for this definition is explained after introducing d-representable complexes. Next we introduce some notation and state a precise definition. A face σ of a simplicial complex K is collapsible if there is a unique maximal face of K containing σ (by maximal face we always mean inclusionwisemaximal face ). Unless stated otherwise, we denote this maximal face by τ(σ). (We allow τ(σ) = σ.) Moreover, if dimσ d 1, then σ is d-collapsible. By [σ,τ(σ)] we denote the set {η K σ η τ(σ)} of faces of K that contain σ. We assume that σ is d-collapsible and we say that the complex K = K\[σ,τ(σ)] arises from K by an elementary d-collapse. In symbols, K K. If we want to stress σ we write K = K σ. A complex K d-collapses to a complex L, in symbols K L, if there is a sequence of elementary d-collapses K K 2 K 3 L. This sequence is called a d-collapsing (of K to L). Finally, a complex K is d- collapsible if K. An example of 2-collapsible complex is in Figure 1. The computational complexity of d-collapsibility. How hard is it to decide whether a given simplicial complex is d-collapsible? We consider the computational complexity of this question (the size of an input is the number of faces of the complex in the question), regarding d as a fixed integer; we refer to it as d-collapsibility. According to Lekkerkerker and Boland [LB62] (see also [Weg75]), 1-collapsible complexes are exactly clique complexes over chordal graphs. (A graph is chordal if it does not contain an induced cycle of size 4 or more.) 1-COLLAPSIBILITY is therefore polynomial time solvable. (Polynomiality of 1-COLLAPSIBILITY also follows from Theorem 1.2(i).) The main result of this paper is the following: Theorem 1.1. (i) 2-COLLAPSIBILITY is polynomial time solvable. 2
3 σ= {2,4} τ(σ)={2,4} 2 3 σ= {1,2} τ(σ)={1,2,3} 2 3 σ= {2} τ(σ)={2,3} 3 σ= {1,3} τ(σ)={1,3} σ= {3} τ(σ)={3,4} 4 1 σ= τ(σ)={1,4} Figure 1: An example of 2-collapsing. (ii) d-collapsibility is NP-complete for d 4. Suppose that d is fixed. A good face is a d-collapsible face of K such that K σ is d-collapsible; a bad face is a d-collapsible face of K such that K σ is not d-collapsible. Now suppose that K is a d-collapsible complex. It is not immediately clear whether we can choose elementary d-collapses greedily in any order to d-collapse K, or whether there is a bad sequence of d-collapses such that the resulting complex is no longer d-collapsible. Therefore, we consider the following question: For which d there is a d-collapsible complex K such that it contains a bad face? The answer is: Theorem 1.2. (i) Let d 2. Then every d-collapsible face of a d-collapsible complex is good. (ii) Let d 3. Then there exists a d-collapsible complex containing a bad d- collapsible face. Theorem 1.1(i) is a straightforward consequence of Theorem 1.2(i). Indeed, if we want to test whether a given complex is 2-collapsible, it is sufficient to greedily collapse d-collapsible faces. Theorem 1.2(i) implies that we finish with an empty complex if and only if the original complex is 2-collapsible. Our construction for Theorem 1.2(ii) is an intermediate step to proving Theorem 1.1(ii). 3
4 1.2 Motivation and background d-representable complexes. Helly s theorem [Hel23] asserts that if C 1,C 2,...,C n are convex sets in R d, n d + 1, and every d + 1 of them have a common point, then C 1 C 2 C n. This theorem (and several other theorems in discrete geometry) deals with intersection patterns of convex sets in R d. It can be restated using the notion of d-representable complexes, which record the intersection patterns. The nerve of a family S = {S 1,S 2,...,S n } of sets is the simplicial complex with vertex set [n] = {1, 2,...,n} and with the set σ [n] forming a face if i σ S i. A simplicial complex is d-representable if it is isomorphic to the nerve of a family of convex sets in R d. In this language, Helly theorem states that if a d-representable complex (with the vertex set V ) contains all faces of dimension at most d, then it is already a full simplex 2 V. Beside Helly s theorem we also mention several other known results that can be formulated using d-representability. They include the fractional Helly theorem of Katchalski and Liu [KL79], the colorful Helly theorem of Lovász ([Lov74]; see also [Bár82]), the (p, q)-theorem of Alon and Kleitman [AK92], and the Helly type result of Amenta [Ame96]. d-leray complexes. Another related notion is a d-leray simplicial complex, where K is d-leray if every induced subcomplex of K (i.e. a subcomplex of the form K[X] = {σ X σ K} for some subset X of the vertex set of K) has zero homology (over Q) in dimensions d and larger. We will mention d-leray complexes only briefly, thus the article should be accessible also for the reader not familiar with homology. Relations among the preceding notions. Wegner [Weg75] proved that d- representable complexes are d-collapsible and also that d-collapsible complexes are d-leray. Regarding the first inclusion, suppose that we are given convex sets in R d representing a d-representable complex. Sliding a generic hyperplane (say from infinity to minus infinity) and cutting off the pieces on the positive side of the hyperplane yields a d-collapsing of the complex. (Several properties have to be checked, of course.) This is the main motivation for the definition of d-collapsibility. The second inclusion is more-less trivial (for a reader familiar with homology) since d-collapsing does not affect homology of dimension d and larger. Many results on d-representable complexes can be generalized in terms of d-collapsible complexes, the results mentioned here even for d-leray complexes. For example, a topological generalization of Helly s theorem follows from Helly s own work [Hel30], a generalization of the fractional Helly theorem and (p, q)-theorem was done in [AKMM02], and a generalization of the colorful Helly theorem and Amenta s theorem was proved by Kalai and Meshulam [KM05], [KM08]. 4
5 Dimensional gaps between collapsibility and representability were studied by Matoušek and the author [MT09, Tan10b]; an interesting variation on d- collapsibility was used by Matoušek in order to show that it is not easy to remove degeneracy in LP-type problems [Mat09]. Related complexity results. Similarly as d-collapsibility, we can also consider the computational complexity of d-representability and d-le- RAY COMPLEX. By a modification of a result of Kratochvíl and Matoušek on string graphs ([KM89]; see also [Kra91]), one has that 2-REPRESENTABILITY is NP-hard. Moreover, this result also implies that d-representability is NP-hard for d 2. Details are given in Section 6. It is not known to the author whether d-representability belongs to NP. Finally, d-leray COMPLEX is polynomial time solvable, since an equivalent characterization of d-leray complexes is that it is sufficient to test whether the homology (of dimension greater or equal to d) of links 2 of faces of the complex in the question vanishes. These tests can be performed in a polynomial time; see [Mun84] (note that the k-th homology of a complex of dimension less than k is always zero; note also that the homology is over Q, which simplifies the situation computing homology for this case is indeed only a linear algebra). Among the above mentioned notions, d-representability is of the biggest interest since it straightly affects intersection patterns of convex sets. However, NP-hardness of this problem raises the question, whether it can be replaced with d-collapsibility or d-leray COMPLEX. As we have already mentioned, d-leray COMPLEX is polynomial time solvable thus one could be satisfied with replacing d-representability with d-leray COMPLEX. However, d-collapsibility is closer to d-representability. One of the important differences regards Wegner s conjecture. An open set in R d homeomorphic to an open ball is a d-cell. A good cover in R d is a collection of d-cells such that an intersection of any subcollection is again a d-cell or empty. Wegner conjectured that nerve of a finite good cover in R d is d-collapsible. A recent result of the author disproves this conjecture [Tan10a]. However, the nerve of a finite good cover in R d is always d-leray due to the nerve theorem; see, e.g, [Bjö95, Bor48]. We get that the notion of d-leray complexes cannot distinguish the nerves of collections of convex sets and good covers; however, d- representability is stronger in this respect. That is also why we want to clarify the complexity status of d-collapsibility. A particular example of computational interest. A collection of convex sets in R d has a (p,q)-property with p q d + 1 if among every p sets of the collection there is a subcollection of q sets with a nonempty intersection. The above mentioned (p, q)-theorem of Alon and Kleitman states that for all integers 2 A link of a face σ in a complex K is the complex {η K η σ K,η σ = }. 5
6 p,q,d with p q d+1 there is an integer c such that for every finite collection of convex sets in R d with (p,q)-property there are c points in R d such that every convex set of the collection contains at least one of the selected points. Let c = c (p,q,d) be the minimum possible value of c for which the conclusion of the (p,q)-theorem holds. A significant effort was devoted to estimating c. The first unsolved case regards estimating c (4, 3, 2). The best bounds 3 are due to Kleitman, Gyárfás and Tóth [KGT01]: 3 c (4, 3, 2) 13. It seems that the actual value of c (4, 3, 2) is rather closer to the lower bound in this case, and thus it would be interesting to improve the lower bound even by one. 4 Here 2-collapsibility could come into the play. When looking for a small example one could try to generate all 2-collapsible complexes and check the other properties. Collapsibility in Whitehead s sense. Beside d-collapsibility, collapsibility in Whitehead s sense is much better known (called simply collapsibility). In the case of collapsibility, we allow only to collapse a face σ that is a proper subface of the unique maximal face containing σ. On the other hand, there is no restriction on dimension of σ. Let us mention that one of the important differences between d-collapsibility and collapsibility is that every finite simplicial complex is d-collapsible for d large enough; on the other hand not an every finite simplicial complex is collapsible. Malgouyres and Francés [MF08] proved that it is NP-complete to decide, whether a given 3-dimensional complex collapses to a given 1-dimensional complex. However, their construction does not apply to d-collapsibility. A key ingredient of their construction is that collapsibility distinguishes a Bing s house with thin walls and a Bing s house with a thick wall. However, they are not distinguishable from the point of view of d-collapsibility. They are both 3-collapsible, but none of them is 2-collapsible. Technical issues. Throughout this paper we will use several technical lemmas about d-collapsibility. Since I think that the main ideas of the paper can be followed even without these lemmas I decided to put them separately to Section 5. The reader is encouraged to skip them for the first reading and look at them later for full details. The paper contains many symbols. For the reader s convenience we add a list of often used symbols. It is situated at the end of the paper just above the bibliography. 2 2-collapsibility Here we prove Theorem 1.2(i). 3 Known to the author. 4 Kleitman, Gyárfás and Tóth offer $30 for such an improvement. 6
7 The case d = 1 follows from the fact that d-collapsible complexes coincide with d-leray ones ([LB62, Weg75]). Indeed, let K be a 1-collapsible complex and let σ be its 1-collapsible face. We have that K is 1-Leray, which implies that K σ is 1-Leray (1-collapsing does not affect homology of dimensions 1 and more). This implies that K σ is 1-collapsible, i.e., σ is good. In fact, the case d = 1 can be also solved by a similar (simpler) discussion as the following case d = 2. It remains to consider the case d = 2. Suppose that K is a 2-collapsible complex which, for contradiction, contains a bad 2-collapsible face σ B K. On the other hand, it also contains a good face σ G since it is 2-collapsible. Moreover, we can, without loss of generality, suppose that K is the smallest complex (according to the number of faces) with these properties. Claim 2.1. Let σ be a good face of K and let σ be a 2-collapsible face of K σ. Then σ is a good face of K σ. Proof. The complex K σ is 2-collapsible since σ is a good face of K. If σ were a bad face of K σ, then K σ would be a smaller counterexample to Theorem 1.2(i) contradicting the choice of K. Recall that τ(σ) denotes the unique maximal superface of a collapsible face σ. Two collapsible faces σ and σ are independent if τ(σ) τ(σ ); otherwise, they are dependent. The symbol St(σ, K) denotes the (open) star of a face σ in K, which consists of all superfaces of σ in K (including σ). We remark that St(σ, K) = [σ, τ(σ)] in case that σ is collapsible. Claim 2.2. Let σ,σ K be independent 2-collapsible faces. Then σ is a 2- collapsible face of K σ, σ is a 2-collapsible face of K σ, and (K σ ) σ = (K σ ) σ. Proof. Since τ(σ) τ(σ ), we have σ τ(σ ). Thus, St(σ, K) = St(σ, K σ ), implying that τ(σ) is also a unique maximal face containing σ when considered in K σ. It means that σ is a collapsible face of K σ. Symmetrically, σ is a collapsible face of K σ. Finally, (K σ ) σ = (K σ ) σ = K \ {η K σ η or σ η }. Claim 2.3. Any two 2-collapsible faces of K are dependent. Proof. For contradiction, let σ, σ be two independent 2-collapsible faces in K. First, suppose that one of them is good, say σ, and the second one, i.e., σ, is bad. The face σ is a collapsible face of K σ by Claim 2.2. Thus, (K σ ) σ is 2- collapsible by Claim 2.1. But (K σ ) σ = (K σ ) σ by Claim 2.2, which contradicts the assumption that σ is a bad face. Now suppose that σ and σ are good faces. Then at least one of them is independent of σ B, which yields the contradiction as in the previous case. Similarly, if both of σ and σ are bad faces, then at least one of them is independent of σ G. 7
8 τ σ k η τ k σ B Figure 2: The simplices τ, τ k and η. Due to Claim 2.3 there exists a universal τ K such that τ = τ(σ) for every 2-collapsible σ K. Let us remark that K 2 τ since σ B is a bad face. The following claim represents a key difference among 2-collapsibility and d-collapsibility for d 3. It wouldn t be valid in case of d-collapsibility. Claim 2.4. Let σ be a good face and let σ be a bad face. Then σ σ =. Proof. It is easy to prove the claim in the case that either σ or σ is a 0-face. Let us therefore consider the case that both σ and σ are 1-faces. For contradiction suppose that σ σ, i.e., σ = {u,v}, σ = {v,w} for some mutually different u,v,w τ. Then τ \ {u} is a unique maximal face in K σ that contains σ, so (K σ ) σ exists. Similarly, (K σ ) σ exists and the same argument as in the proof of Claim 2.2 yields (K σ ) σ = (K σ ) σ. Similarly as in the proof of Claim 2.3, (K σ ) σ is 2-collapsible (due to Claim 2.1), but it contradicts the fact that σ is a bad face. The complex K is 2-collapsible. Let K = K 1 K 2 K m = be a 2-collapsing of K, where K i+1 = K i \ [σ i,τ i ]. Clearly, τ 1 = τ. Let k be the minimal integer such that τ k τ. Such k exists since K 2 τ. Moreover, we can assume that all the faces σ 1,...,σ k are edges. This assumption is possible since collapsing a vertex can be substituted by collapsing the edges connected to the vertex and then removing the isolated vertex at the very end of the process. See Lemma 5.2 for details. Claim 2.5. The face σ k is a subset of τ, and it is not a 2-collapsible face of K. Proof. Suppose for contradiction that σ k τ. Then St(σ k, K) = St(σ k, K i ) since only subsets of τ are removed from K during the first i 2-collapses. It implies that σ k is a 2-collapsible face of K contradicting the definition of τ. It is not a 2-collapsible face of K since it is contained in τ and τ k τ. Claim 2.6. The faces σ 1,σ 2,...,σ k 1 are good faces of K. 8
9 Proof. First we observe that each σ i is 2-collapsible face of K for 0 i k 1. If σ i was not 2-collapsible then there is a face ϑ K containing σ i such that ϑ τ. Then ϑ K i due to minimality of k. Consequently τ i cannot be the unique maximal face of K i containing σ i since ϑ contains σ i as well. In order to show that the faces are good we proceed by induction. The face σ 1 is a good face of K since there is a d-collapsing of K starting with σ 1. Now we assume that σ 1,...,σ i 1 are good faces of K for i k 1. If there is an index j < i such that σ j σ i then σ i is good by Claim 2.4. If this is not the case then we set σ 1 = {x,y}. The faces σ i {x} and σ i {y} belong to K i ; however, σ 1 σ i does not belong to K i since σ 1 was collapsed. Thus σ i does not belong to a unique maximal face. Let η = σ k σ B. See Figure 2. Claim 2.5 implies that η τ. By Claim 2.4 (and the fact that σ k is not a good face a consequence of Claim 2.5) the face η does not contain a good face. Thus, η K k by Claim 2.6. In particular η τ k since τ k is a unique maximal face of K k containing σ k, hence σ B τ k. On the other hand, τ is a unique maximal face of K K k containing σ B since σ B is a 2-collapsible face, which implies τ k τ. It is a contradiction that τ k τ. 3 d-collapsible complex with a bad d-collapse In this section we prove Theorem 1.2(ii). We start with describing the intuition behind the construction. Given a full complex K = 2 S (the cardinality of S is 2d), any (d 1)-face is d-collapsible. However, once we collapse one of them, say σ B, the rest (d 1)-faces will be divided into two sets, those which are collapsible in K σb (namely, Σ), and those which are not (namely, Σ). For example, when d = 2, given a tetrahedron, after collapsing one edge, among the rest five edges, four are collapsible and one is not. The idea of the construction is to attach a suitable complex C to K in such a way that the faces of Σ are properly contained in faces of C (and thus they cannot be collapsed until C is collapsed); there is a sequence of d-collapses of some of the faces of Σ such that C can be subsequently d-collapsed. In summary the resulting complex is d-collapsible because of the second requirement. However, if we start with σ B, we get stuck because of the first requirement. 3.1 Bad complex Now, for d 3, we construct a bad complex B, which is d-collapsible but it contains a bad face. A certain important but technical step of the construction 9
10 is still left out. This is to give the more detailed intuition to the reader. Details of that step are given in the subsequent subsections. The complex C glued. Suppose that σ, γ 1,...,γ t are already known (d 1)-dimensional faces of a given complex L. These faces are assumed to be distinct, but not necessarily disjoint. We start with the complex K = 2 σ 2 γ 1 2 γt. We attach a certain complex C to L. The resulting complex is denoted by C glued (σ;γ 1,...,γ t ). Here we leave out the details; however, the properties of C glued are described in the forthcoming lemma (we postpone the proof of this lemma). Lemma 3.1. Let L, L, and C glued = C glued (σ;γ 1,...,γ t ) be the complexes from the previous paragraph. Then we have: (i) If σ is a maximal face of L, then L C glued L \ {σ}. (ii) The only d-collapsible face of C glued is the face σ. (iii) Suppose that d is a constant. Then the number of faces of C glued is O(t). Let S = {p,q 1,...,q d 1,r 1,...,r d } be a 2d-element set. Consider the full simplex 2 S. We name its (d 1)-faces: ι = {p,q 1,...,q d 1 } is an initial face, λ i = {q 1,...,q d 1,r i } are liberation faces for i [d], σ B = {r 1,...,r d }, we will show that σ B is a bad face. The remaining (d 1)-faces are attaching faces; let us denote these faces by α 1,..., α t. We define B by B = 2 S C glued (ι;α 1,...,α t ). See Figure 3 for a schematic drawing. Proof of Theorem 1.2(ii). We want to prove that B is d-collapsible, but it contains a bad d-collapsible face. First, we observe that σ B is a bad face. By Lemma 3.1(ii) and the inspection, the only d-collapsible faces of B are λ i and σ B for i [d]. After collapsing σ B there is no d-collapsible face, implying that σ B is a bad face. In order to show d-collapsibility of B we need a few other definitions. The complex R is defined by R = { σ 2 S if {q 1,...,q d 1 } σ then σ ι }. We observe that R \ {ι} is d-collapsible and also that 2 S R by collapsing all liberation faces (in any order). In fact, the first observation is a special case of Lemma 4.1(ii) used for the NP-reduction. An auxiliary complex A is defined in a similar way to B: 10
11 r 2 α 1 σ B λ 2 p C glued(ι;α 1,α 2 ) α 2 r 1 ι λ 1 q 1 2 S B Figure 3: A schematic drawing of the complexes 2 S and B. A = R C glued (ι;α 1,...,α t ). We show d-collapsibility of B by the following sequence of d-collapses: B A R \ {ι}. The fact that B A is quite obvious it is sufficient to d-collapse the liberation faces. More precisely, we use Lemma 5.3 with K = B, K = 2 S, and L = R. The fact that A R \ {ι} follows from Lemma 3.1(i). We already observed that R \ {ι} when defining R. 3.2 The complex C Our proof relies on constructing d-dimensional d-collapsible complex C such that its first d-collapse is unique. We call this complex a connecting gadget. Precise properties of the connecting gadget are stated in Proposition 3.2. Before stating the proposition we define the notion of distant faces. Suppose that K is a simplicial complex and let u, v be two of its vertices. By dist(u,v) we mean their distance in graph-theoretical sense in the 1-skeleton of K. We say that two faces ω,η K are distant if dist(u,v) 3 for every u ω,v η. Proposition 3.2. Let d 2 and t 0 be integers. There is a d-dimensional complex C = C(ρ;ζ 1,...,ζ t ) with the following properties: (i) It contains (d 1)-dimensional faces ρ,ζ 1,...,ζ t such that each two of them are distant faces. 11
12 F u F u d=2 d=3 Figure 4: The space X. The arrows denote, which facets are identified. (ii) Let C = C (ρ;ζ 1,...,ζ t ) be the subcomplex of C given by C = 2 ρ 2 ζ 1 2 ζt. Then C (C \ {ρ}). In particular, C is d-collapsible since (C \ {ρ}) is d-collapsible. (iii) The only d-collapsible face of C is the face ρ. (iv) Suppose that d is a constant. Then the number of faces of C is O(t). 3.3 The complex C(ρ) We start our construction assuming t = 0; i.e., we construct the connecting gadget C = C(ρ). We remark that the construction of C is in some respects similar to the construction of generalized dunce hats. We refer to [AMS93] for more background. The geometric realization of C(ρ). First, we describe the geometric realization, C, of C. Let P be the d-dimensional crosspolytope, the convex hull conv {e 1, e 1,...,e d, e d } of the vectors of the standard orthonormal basis and their negatives. It has 2 d facets F s = conv {s 1 e 1,...,s d e d }, where s = (s i ) d i=1 { 1, 1} d (s for sign). We want to glue all facets together except the facet F u where u = (1,...,1) (see Figure 4). More precisely, let s { 1, 1} d \{u}. Every x F s can be uniquely written as a convex combination x = x a,s = a 1 s 1 e 1 + +a d s d e d where a = (a i ) d i=1 [0, 1] d and d { i=1 a i = 1. For every } such fixed a we glue together the points in the set x a,s s { 1, 1} d \ {u} ; by X we denote the resulting space. We will construct C in such a way that X is a geometric realization of C. 12
13 e 2 e 2 e 1 { e 1,e 2 } ϑ 0 e 1 0 e 1 { e 1 } e 2 J\2 ϑ { e 2 } Figure 5: The triangulations J (left) and H (right) of P with d = 2. Triangulations of the crosspolytope. We define two auxiliary triangulations of P they are depicted in Figure 5. The simplicial complex J is the simplicial complex with vertex set {0,e 1, e 1,...,e d, e d }. The set of its faces is given by the maximal faces {0,s 1 e 1,s 2 e 2,...,s d e d } where s 1,s 2,...,s d { 1, 1}. The complex J is a triangulation of P. Let ϑ be the face {0,e 1,...,e d }. The complex H is constructed by iterated stellar subdivisions starting with J and subdividing faces of J\2 ϑ (first subdividing d-dimensional faces, then (d 1)-dimensional, etc.). Formally, H is a complex with the vertex set (J \ 2 ϑ ) ϑ and with faces of the form {{σ 1,...,σ k } τ} where σ 1 σ k τ;σ 1,...,σ k J \ 2 ϑ ;τ ϑ;k N 0. The construction of C. Informally, we obtain C from H by the same gluing as was used for constructing X from P. Formally, let be an equivalence relation on (J \ 2 ϑ ) ϑ given by e i { e i } for i [d], σ 1 σ 2 for σ 1,σ 2 J \ 2 ϑ, σ 1 = {s 1 e k1,...,s m e km }, σ 2 = {s 1e k1,...,s me km } where s i,s i { 1, 1} and 1 k 1 < < k m d. For an equivalence relation on a set X we define + to be an equivalence relation on Y 2 X inherited from ; i.e., we have, for Y 1,Y 2 Y, Y 1 + Y 2 if and only if there is a bijection f : Y 1 Y 2 such that f(y) y for every y Y 1. We define C = H/ +. One can prove that C is indeed a simplicial complex and also that C is homeomorphic to X (since the identification C = H/ + was chosen to follow the construction of X). The faces of C are the equivalence classes of +. We use the notation σ for such an equivalence class given by σ H. By ρ we denote the face {e 1,...,e d } of C. 13
14 v 3 =w 3,3t ρ ζ 1 ζ 2 v 1 =w 1,3t v 2 =w 2,3t Figure 6: The complex D(ζ 1,ζ 2 ) (left) and C(ρ;ζ 1,ζ 2 ) (right), here d = The complex C(ρ; ζ 1,...,ζ t ) Now we assume that t 1 and we construct the complex C(ρ;ζ 1,...,ζ t ), which is a refinement of C(ρ). The idea of the construction is quite simple. We pick an interior simplex of C(ρ); and we subdivide it in such a way that we obtain distant (d 1)-dimensional faces ζ 1,...,ζ t (and also distant from ρ). For completeness we show a particular way how to get such a subdivision. A suitable triangulation of a simplex. An example of the following construction is depicted in Figure 6. Let be a d-dimensional (geometric) simplex with a set of vertices V = {v 1,...,v d+1 }, let b be its barycentre, and let t be an integer. Next, we define { W = w i,j w i,j = b + j } 3t (v i b),i [d + 1],j [3t]. Note that V W. For j [t], ζ j is a (d 1)-face {w 1,3j 2,w 2,3j 2,...,w d,3j 2 }. Now we define polyhedra Q 1,...,Q 3t. The polyhedron Q 1 is the convex hull conv {w 1,1...,w d+1,1 }. For j [3t] \ {1} the polyhedron Q j is the union of the convex hulls conv {w k,l k [d + 1] \ {i},l {j 1,j}}. i [d+1] The polyhedron Q 1 is a simplex. For j > 1, the polyhedra Q j are isomorphic to the prisms d [0, 1], where d is a d-simplex. Each such prism admits a (standard) triangulation such that d {0} and d {1} are not subdivided (see [Mat03, Exercise 3, p. 12]). Let D(ζ 1,...,ζ t ) denote an abstract simplicial complex on a vertex set W, which comes from a triangulation of obtained by first subdividing it into 14
15 the polyhedra Q 1,...,Q 3t and subsequently triangulating these polyhedra as described above. The definition of C(ρ; ζ 1,..., ζ t ). Let ξ be a d-face of H such that ξ int H. Although there are multiple such d-faces only some of them are used as ξ. For example, in Figure 6, only one out of four such d-faces is chosen. Suppose that the set V (from above) is the set of vertices of ξ. We define C(ρ;ζ 1,...,ζ t ) = (C(ρ) \ { ξ }) D(ζ 1,...,ζ t ) while recalling that ξ denotes the equivalence class of + from the definition of C. See Figure 6. Proof of Proposition 3.2. The claims (i), (iii) and (iv) follow straightforwardly from the construction. Regarding the claim (ii), informally, we first d-collapse the face ρ; after that we d-collapse the interior of C in order to collapse all d-dimensional faces except the faces that should remain in C \ {ρ}. Formally, we use Lemma 5.4. Gluing. Here we focus on gluing briefly discussed above Lemma 3.1. As the name of connecting gadget suggests, we want to use it (in Section 4) for connecting several other complexes (gadgets). In particular, we want to have some notation for gluing this gadget. We introduce this notation here. Again we suppose that σ, γ 1,...,γ t are already known (d 1)-dimensional faces of a given complex L. They are assumed to be distinct, but not necessarily disjoint. There is a complex K = 2 σ 2 γ 1 2 γt. We take a new copy of C(ρ;ζ 1,...,ζ t ) and we perform identifications ρ = σ, ζ 1 = γ 1,...,ζ t = γ t. After these identifications, the complex K C(ρ;ζ 1,...,ζ t ) is denoted by C glued (σ;γ 1,...,γ t ). Note that C (before gluing) and C glued are generally not isomorphic since the gluing procedure can identify some faces of C. Proof of Lemma 3.1. The first claim follows from Lemma 5.6. The second claim follows from Proposition 3.2(i) and (iii). The last claim follows from Proposition 3.2(iv). 4 NP-completeness Here we prove Theorem 1.1(ii). Throughout this section we assume that d 4 is a fixed integer. We have that d-collapsibility is in NP since if we are given a sequence of faces of dimension at most d 1 we can check in a polynomial time whether this sequence determine a d-collapsing of a given complex. For NP-hardness, we reduce the problem 3-SAT to d-collapsibility. The problem 3-SAT is NP-complete according to Cook [Coo71]. Given a 3-CNF formula Φ, we construct a complex F that is d-collapsible if and only if Φ is satisfiable. 15
16 4.1 Sketch of the reduction Let us recall the construction of the bad complex B. We have started with a simplex 2 S and we distinguished the initial face ι and the bad face σ B. We were allowed to start the collapsing either with σ B or with liberation faces and then with ι. As soon as one of the options was chosen the second one was unavailable. The idea is that these two options should represent an assignment of variables in the formula Φ. A disadvantage is that we cannot continue after collapsing σ B. Thus we rather need to distinguish two initial faces ι + and ι each of them having its own liberation faces. However, we need that these two collections of liberation faces do not interfere. That is why we have to assume d 4. For every variable x j of the formula Φ we thus construct a certain variable gadget V j with two initial faces ι + j and ι j. For a clause Ci in the formula Φ there is a clause gadget G i. Initially it is not possible to collapse clause gadgets. Assume, e.g., that C i contains variables x j and x j in positive occurrence and x j in negative occurrence. Then it is possible to collapse G i as soon as ι + j, ι+ j, or ι j was collapsed. (This is caused by attaching a suitable copy of the connection gadget C from the previous section.) Thus the idea is that the complex F in the reduction is collapsible if and only if all clause gadgets can be simultaneously collapsed which happens if and only if Φ is satisfiable. There are few more details to be supplied. Similarly as for the construction of B we have to attach a copy T of the connecting gadget C to the faces which are neither initial nor liberation (i.e., to attaching faces). This step is necessary for controlling which faces can be collapsed. This copy of connecting gadget is called a tidy connection and once it is activated (at least on of its faces is collapsed) then it is consequently possible to collapse the whole complex F. Finally, there are inserted certain gadgets called merge gadgets. Their purpose is to merge the information obtained by clause gadgets: they can be collapsed after collapsing all clause gadgets and then they activate the tidy connection. The precise definition of F will be described in following subsections. At the moment it can be helpful for the reader to skip few pages and look at Figure 8 (although there is a notation on the picture not introduced yet). 4.2 Simplicial gadgets Now we start supplying the details. As sketched above we introduce several gadgets called simplicial gadgets. They consist of full simplices (on varying number of vertices) with several distinguished (d 1)-faces. These gadgets generalize the complex 2 S. Every simplicial gadget contains one or more (d 1)-dimensional pairwise disjoint initial faces. Every initial face ι contains several (possibly only one) distinguished (d 2)-faces called bases of ι. The liberation faces of the gadget are such (d 1)-faces λ that contain a base of some initial face ι, but λ ι. 16
17 ι ι + ι ι merge one base one base three bases λ merge,1 one base λ merge,2 the variable gadget the clause gadget the merge gadget Figure 7: A schematic pictures of simplicial gadgets; the liberation faces of the merge gadget are distinguished. The remaining (d 1)-faces are attaching faces. Now we define several concrete examples of simplicial gadgets. The variable gadget. The variable gadget V = V(ι +,ι,β +,β ) is described by the following table: vertices: p +,q + 1,...,q + d 1, p,q 1,...,q d 1 ; initial faces: ι + = { p +,q + 1,...,q + d 1}, ι = { p,q 1,...,q d 1} ; bases: β + = { q + 1,...,q + d 1}, β = { q 1,...,q d 1}. The clause gadget. The clause gadget G(ι,λ 1,λ 2,λ 3 ) is given by: vertices: p 1,...,p d,q; initial face: ι = {p 1,p 2,...,p d }; bases: β 1 = ι \ {p 1 }, β 2 = ι \ {p 2 }. β 3 = ι \ {p 3 }. Every base β j is contained in exactly one liberation face λ j = β j {q}. The merge gadget. The merge gadget M(ι merge,λ merge,1,λ merge,2 ) is given by: vertices: p 1,...,p d,q,r; initial face: ι merge = {p 1,p 2,...,p d }; base: ι merge \ {p 1 }. The merge gadget contains exactly two liberation faces, which we denote λ merge,1 and λ merge,2. We close this subsection by proving a lemma about d-collapsings of simplicial gadgets. Lemma 4.1. Suppose that S is a simplicial gadget, ι is its initial face, β ι is a base face, and λ 1,...,λ t are liberation faces containing β. Then d-collapsing of λ 1,...,λ t (even in any order) yields a complex R such that (i) ι is a maximal face of R; (ii) R \ {ι} is d-collapsible; 17
18 (iii) R \ {ι} 2 ι where ι is an initial face different from ι (if exists). Proof. We prove each of the claims separately. (i) Let V be the set of vertices of S and let λ t+1 = ι. We (inductively) observe that d-collapsing of faces λ 1,...,λ k for k t yields a complex in which λ k+1 is contained in a unique maximal face (V \ (λ 1 λ k )) β. This implies that R is well defined and also finishes the first claim since (V \ (λ 1 λ t )) β = ι. We remark that the few details skipped here are exactly the same as in the proof of Lemma 5.1. (ii) We observe that β is a maximal (d 2)-face of R \ {ι} and S β = R \ {ι,β}, hence R \ {ι} S β. (We recall that K σ denotes the resulting complex of an elementary d-collapse K K σ = K \ [σ,τ(σ)].) Next, S β S = by Lemma 5.1. (iii) Similarly as before we have R \ {ι} S β. Let v be a vertex of β, we have S β S {v} by Lemma 5.1. The complex S {v} is a full simplex (S with removed v), this complex even 1-collapse to 2 ι by collapsing vertices of V \ (ι {v}) (in any order). 4.3 The reduction Let the given 3-CNF formula be Φ = C 1 C 2 C n, where each C i is a clause with exactly three literals (we assume without loss of generality that every clause contains three different variables). Suppose that x 1,...,x m are variables appearing in the formula. For every such variable x j we take a fresh copy of the variable gadget and we denote it by V j = V j (ι + j,ι j,β+ j,β j ). For every clause C i containing variables x j1, x j2 and x j3 (in a positive or negative occurrence) we take a new copy of the clause gadget and we denote it by G i = G i (ι i,λ i j 1,λ i j 2,λ i j 3 ). Moreover, for C i with i 2, we also take a new copy of the merge gadget and we denote it M i = M i (ι i merge,λ i merge,1,λ i merge,2). Now we connect these simplicial gadgets by glued copies of the connecting gadget called connections. Suppose that a variable x j occurs positively in the clauses C i 1,...,C i k. We construct the positive occurrence connections by setting O + j = C glued (ι + j ;λi 1 j,...,λ i k j ). The negative occurrence connections O j are constructed similarly (we use ι j instead of ι + j ; and we use clauses in which is x j in negative occurrence). 18
19 The merge connections are defined by I 1 1 = C glued (ι 1 ;λ 2 merge,2); I i 1 = C glued (ι i ;λ i merge,1) where i {2,...,n}; I i 2 = C glued (ι i merge;λ i+1 merge,2) where i {2,...,n 1}. For convenient notation we denote I 1 1 also by I 1 2. Finally, the tidy connection is defined by T = C glued (ι n merge;α 1,...,α t ) where α 1,...,α t are attaching faces of all simplicial gadgets in the reduction, namely the variable gadgets V j for j [m], the clause gadgets G i for i [n], and the merge gadgets M i for i {2,...,n}. The complex F in the reduction is defined by F = m V j j=1 n G i i=1 n m n M i (O + j O j ) I i 1 i=2 j=1 i=1 n 1 i=2 I i 2 T. See Figure 8 for an example. We observe that the number of faces of F is polynomial in the number of clauses in the formula (regarding d as a constant). Indeed, we see that the number of gadgets (simplicial gadgets and connections) is even linear in the number of variables. Each simplicial gadget has a constant size. Each connection has at most linear size due to Lemma 3.1(iii). Collapsibility for satisfiable formulae. We suppose that the formula is satisfiable and we describe a collapsing of F; see Figure 9. We assign each variable TRUE or FALSE so that the formula is satisfied. For every variable gadget V j we proceed as follows. First, suppose that x j is assigned TRUE. We d-collapse 5 the liberation faces containing β + j (see Lemma 4.1(i)), after that ι + j is d-collapsible, and we d-collapse O + j (following Lemma 3.1(i) in the same way as in the proof of Theorem 1.2(ii)). Similarly, we d-collapse O j if x j is assigned FALSE. We use several times Lemma 4.1(i) and Lemma 3.1(i) in the following paragraphs. The use is very similar is in the previous one, thus we do not mention these lemmas again. After d-collapsings described above, we have that every clause gadget G i contains at least one liberation face that is d-collapsible since we have chosen such an assignment that the formula is satisfied. We d-collapse this liberation face and after that the face ι i is d-collapsible. We continue with d-collapsing the merge gadgets I i 1 for i [n]. 5 Note that after d-collapsing a liberation face containing β + j the liberation faces containing β j are no more d-collapsible (and vice versa). This will be a key property for showing that unsatisfiable formulae yield to non-collapsible complexes. 19
20 ι + 1 V 1 ι 1 O + 1 ι 1 G 1 I 1 1=I 1 2 ι + 2 V 2 ι 2 ι + 3 V 3 ι 3 G 2 ι 2 G 3 ι 3 I 2 1 I 3 1 M 2 ι 2 merge I 2 2 M 3 ι 3 merge I 3 2 attaching faces T ι + 4 V 4 ι 4 G 4 ι 4 I 4 1 M 4 ι 4 merge Figure 8: A schematic example of F for the formula Φ = (x 1 x 2 x 3 ) ( x 1 x 2 x 4 ) ( x 1 x 3 x 4 ) (x 2 x 3 x 4 ). Initial faces are drawn as points. (Multi)arrows denote connections. Each (multi)arrow points from the unique d- collapsible face of the connection to simplicial gadgets that are attached to the connection by some of its liberation faces. ι + 1 ι ι 1 2 7: remaining connections(not drawn) ι + 2 ι 2 ι + 3 ι 3 ι + 4 ι ι 2 8 ι 3 8 ι ι 2 merge 8 ι 3 merge 8 ι 4 merge attaching faces 5 Figure 9: d-collapsing of F for the Φ from Figure 8 assigned (FALSE, TRUE, TRUE, FALSE). The numbers denote the order in which the parts of F vanish. 20
21 The next step is that we gradually d-collapse the merge gadgets I i 2 for i {2,...,n 1}. For this, we have that both liberation faces of I 2 2 are d-collapsible, we d-collapse them and we have that ι 2 merge is d-collapsible. We d-collapse I 2 2 and now we continue with the same procedure with I 3 2, the I 4 2, etc. Finally, we d-collapse the tidy gadget. The d-collapsing of tidy gadget makes all the attaching faces of simplicial gadgets d-collapsible. After this tidying up we can d-collapse all variable gadgets (using Lemma 4.1(iii)), then all remaining connections, and at the end all remaining simplicial gadgets due to Lemma 4.1(ii). Non-collapsibility for unsatisfiable formulae. Now we suppose that Φ is unsatisfiable and we prove that F is not d-collapsible. For contradiction, we suppose that F is d-collapsible. Let F = F 1 F 2 be a d-collapsing of F. We call it our d-collapsing. For a technical reason, according to Lemma 5.2, we can assume that first (d 1)-dimensional faces are collapsed and after that faces of less dimensions are removed. Let us fix a subcomplex F l in our d-collapsing. Let N be a connection (one of that forming F) and let N l = F l N. We say that N is activated in F l if N l is a proper subcomplex of N. The connection N is defined as C glued (σ;γ 1,...,γ s ) for some (d 1)-faces σ,γ 1,...,γ s of simplicial gadgets in F. We remark that Lemma 3.1(ii) implies that if N is activated in F l then σ F l. We also prove the following lemma about activated connections. Lemma 4.2. Let F l be a complex from our d-collapsing such that T is not activated in F l. Then we have: (i) Let j [m]. If the positive occurrence connection O + j is activated in F l, then the negative occurrence connection O j is not activated in F l (and vice versa). (ii) Let i [n]. If the merge connection I i 1 is activated in F l, then at least one of the three occurrence connections attached to G i is activated in F l. (iii) Let i {2,...,n 1}. If the merge connection I i 2 is activated in F l, then the merge connections I i 1 and I i 1 2 are activated in F l. Proof. Let us consider first l 1 d-collapses of our d-collapsing F = F 1 F 2 F l, where F k+1 = F k \ [σ k,τ k ] for k [l 1]. According to assumption on our d-collapsing, we have that σ 1,...,σ l 1 are (d 1)-dimensional (since T is not activated in F l yet). Now we prove each of the claims separately. 21
22 (i) For a contradiction we suppose that both O + j and O j are activated in F l. We consider the variable gadget V j. We say that an index k [l 1] is relevant if σ k V j. We observe that if k is a relevant index then σ k is a liberation face or an initial face of V j, because attaching faces are contained in T. By positive face we mean either the initial face ι + j or a liberation face containing β + j. A negative face is defined similarly. Let k+ (respectively k ) be the smallest relevant index such that σ k + is a positive face (respectively negative face). These indexes have to exist since both O + j and O j are activated in F l. Without loss of generality k + < k. We show that σ k is not a d-collapsible face of F k 1, thus we get a contradiction. Indeed, let S = σ k + \ σ k. We have S 2 since d 4 (here we crucially use this assumption). Let s S. Then we have σ k {s} F k 1, because σ k {s} does not contain a positive subface (it does not contain β + j since σ k β + j 1, but β+ j 3). On the other hand σ k S K k 1 since it contains σ k +. I.e., σ k is not in a unique maximal face. (ii) We again define a relevant index; this time k [l 1] is relevant if σ k G i. We consider the smallest relevant index k. Again we have that σ k is either the initial face ι i or a liberation face of G i. In fact, σ k cannot be ι i : by Lemma 3.1(ii) we would have that I i 1 F k 1 and also G i F k 1 from minimality of k, which would contradict that σ k is a collapsible face of F k 1. Thus σ k is a liberation face of G i. This implies, again by Lemma 3.1(ii), that at least one of the occurrence gadgets attached to liberation faces is activated even in F k 1. (iii) By a similar discussion as in previous step we have that at least one of the liberation faces λ i merge,1 and λ i merge,2 of M i have to be d-collapsed before d-collapsing ι i merge. However, we observe that d-collapsing only one of these faces is still insufficient for possibility of d-collapsing ι i merge. Hence both of the liberation faces have to be d-collapsed, which implies that both the gadgets I i 1 and I i 1 2 are activated in F l. We also prove an analogy of Lemma 4.2 for the tidy gadget. We have to modify the assumptions, that is why we use a separate lemma. The proof is essentially same as the proof of Lemma 4.2(iii), therefore we omit it. Lemma 4.3. Let l be the largest index such that T is not activated in F l, then the merge connections I n 1 and I n 1 2 are activated in F l. 22
23 Now we can quickly finish the proof of non-collapsibility. Let l be the integer from Lemma 4.3. By this lemma and repeatedly using Lemma 4.2(iii) we have that all merge connections are activated in F l. By Lemma 4.2(ii), for every clause gadget G i there is an occurrence gadget attached to G i, which is activated in F l. Finally, Lemma 4.2(i) implies that for every variable x j at most one of the occurrence gadgets O + j, O j is activated in F l. Let us assign x j TRUE if it is O + j and FALSE otherwise. This is satisfying assignment since for every G i at least one occurrence gadget attached to it is activated in F l. This contradicts the fact that Φ is unsatisfiable. 5 Technical properties of d-collapsing In this section, we prove several auxiliary lemmas on d-collapsibility used throughout the paper. 5.1 d-collapsing faces of dimension strictly less than d 1 Lemma 5.1. Let K be a complex, d an integer, and σ a d-collapsible face (in particular, dimσ d 1). Let σ σ be a face of K of dimension at most d 1. Then σ is d-collapsible and K σ K σ. Proof. We assume that σ σ otherwise the proof is trivial. First, we observe that τ(σ) is a unique maximal face containing σ. Indeed, σ τ(σ) since τ(σ) is the unique maximal face containing σ, and also if η σ, then η σ, which implies η τ(σ). Hence we have that σ is d-collapsible. Let v 1 be a vertex of σ \ σ. It is sufficient to prove that K σ K σ \{v 1 } and proceed by induction. Thus, for simplicity of notation, we can assume that σ = σ {v 1 }. Let v 2,...,v t be vertices of τ(σ) \ σ. By η i we denote the face σ {v i } for i [t]. (In particular, σ = η 1.) For i [t + 1] we define a complex K i by the formula K i = {η K η η 1,...,η η i 1 } = {η K if η σ then v j η for j < i}. From these descriptions we have that η i is a d-collapsible face of K i contained in a unique maximal face τ i = τ(σ) \ {v 1,...,v i 1 }. Moreover (K i ) ηi = K i+1. Thus, we have a d-collapsing K = K 1 K 2 K t+1. See Figure 10 for an example. To finish the proof it remains to observe that K 2 = K σ union of K σ and {σ}, hence K t+1 K σ. and K t+1 is a disjoint 23
24 v 2 v 3 σ σ v 1 K 1 =K K 2 =K σ K 3 K 4 K σ Figure 10: An example of 2-collapsing K K σ K σ. As a corollary, we obtain the following lemma. Lemma 5.2. Suppose that K is a d-collapsible complex. Then there is a d- collapsing of K such that first only (d 1)-dimensional faces are collapsed and after that faces of dimensions less then (d 1) are removed. Proof. Suppose that we are given a d-collapsing of K. Suppose that in some step we d-collapse a face σ that is not maximal and its dimension is less than d 1. Let us denote this step by K K σ. Let σ σ be such a face of K that either dimσ = d 1 or σ is a maximal face. Then we replace this step by d-collapsing K K σ K σ. We repeat this procedure until every d-collapsed face is either of dimension d 1 or maximal. We observe that this procedure can be repeated only finitely many times since in every replacement we increase the number of elementary d-collapses in the d-collapsing, while this number is bounded by the number of faces of K. Finally, we observe that if we first remove a maximal face of dimension less than d 1 and then we d-collapse a (d 1)-dimensional face, we can swap these steps with the same result. 5.2 d-collapsing to a subcomplex Suppose that K is a simplicial complex, K is a subcomplex of it, which d-collapses to a subcomplex L. If certain conditions are satisfied, then we can perform d- collapsing K L in whole K; see Figure 11 for an illustration. The precise statement is given in the following lemma. Lemma 5.3 (d-collapsing a subcomplex). Let K be a simplicial complex, K a subcomplex of K, and L a subcomplex of K. Assume that if σ K \ L, η K, and η σ, then η K \L. Moreover assume that K L. Then L = (K\K ) L is a simplicial complex and K L. Proof. It is straightforward to check that L is a simplicial complex using the equivalence 24
Notes on the symmetric group
Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function
More information4: SINGLE-PERIOD MARKET MODELS
4: SINGLE-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) Slides 4: Single-Period Market Models 1 / 87 General Single-Period
More informationComputing Unsatisfiable k-sat Instances with Few Occurrences per Variable
Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.
More informationA relation on 132-avoiding permutation patterns
Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,
More informationNon replication of options
Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial
More informationEssays on Some Combinatorial Optimization Problems with Interval Data
Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university
More informationComputing Unsatisfiable k-sat Instances with Few Occurrences per Variable
Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Abstract (k, s)-sat is the propositional satisfiability problem restricted to instances where each
More informationCOMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS
COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence
More informationOn the h-vector of a Lattice Path Matroid
On the h-vector of a Lattice Path Matroid Jay Schweig Department of Mathematics University of Kansas Lawrence, KS 66044 jschweig@math.ku.edu Submitted: Sep 16, 2009; Accepted: Dec 18, 2009; Published:
More information3 The Model Existence Theorem
3 The Model Existence Theorem Although we don t have compactness or a useful Completeness Theorem, Henkinstyle arguments can still be used in some contexts to build models. In this section we describe
More informationGame Theory: Normal Form Games
Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.
More informationMITCHELL S THEOREM REVISITED. Contents
MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no
More informationCollinear Triple Hypergraphs and the Finite Plane Kakeya Problem
Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the
More informationLaurence Boxer and Ismet KARACA
THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.
More informationLaurence Boxer and Ismet KARACA
SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and
More informationRevenue Management Under the Markov Chain Choice Model
Revenue Management Under the Markov Chain Choice Model Jacob B. Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jbf232@cornell.edu Huseyin
More informationOn the Number of Permutations Avoiding a Given Pattern
On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2
More informationA Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs
A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs Daphne Der-Fen Liu Department of Mathematics California State University, Los Angeles, USA Email: dliu@calstatela.edu Xuding Zhu
More information3.2 No-arbitrage theory and risk neutral probability measure
Mathematical Models in Economics and Finance Topic 3 Fundamental theorem of asset pricing 3.1 Law of one price and Arrow securities 3.2 No-arbitrage theory and risk neutral probability measure 3.3 Valuation
More informationMaximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in
Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in a society. In order to do so, we can target individuals,
More information3 Arbitrage pricing theory in discrete time.
3 Arbitrage pricing theory in discrete time. Orientation. In the examples studied in Chapter 1, we worked with a single period model and Gaussian returns; in this Chapter, we shall drop these assumptions
More informationCharacterization of the Optimum
ECO 317 Economics of Uncertainty Fall Term 2009 Notes for lectures 5. Portfolio Allocation with One Riskless, One Risky Asset Characterization of the Optimum Consider a risk-averse, expected-utility-maximizing
More informationTHE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET
THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the
More informationPORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA
PORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA We begin by describing the problem at hand which motivates our results. Suppose that we have n financial instruments at hand,
More informationTHE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE
THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,
More informationLecture 2: The Simple Story of 2-SAT
0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that
More informationLevin Reduction and Parsimonious Reductions
Levin Reduction and Parsimonious Reductions The reduction R in Cook s theorem (p. 266) is such that Each satisfying truth assignment for circuit R(x) corresponds to an accepting computation path for M(x).
More informationStrong normalisation and the typed lambda calculus
CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these
More informationAnother Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded)
3sat k-sat, where k Z +, is the special case of sat. The formula is in CNF and all clauses have exactly k literals (repetition of literals is allowed). For example, (x 1 x 2 x 3 ) (x 1 x 1 x 2 ) (x 1 x
More informationAlgebra homework 8 Homomorphisms, isomorphisms
MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5
More informationMATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models
MATH 5510 Mathematical Models of Financial Derivatives Topic 1 Risk neutral pricing principles under single-period securities models 1.1 Law of one price and Arrow securities 1.2 No-arbitrage theory and
More information10.1 Elimination of strictly dominated strategies
Chapter 10 Elimination by Mixed Strategies The notions of dominance apply in particular to mixed extensions of finite strategic games. But we can also consider dominance of a pure strategy by a mixed strategy.
More informationSublinear Time Algorithms Oct 19, Lecture 1
0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation
More informationSubgame Perfect Cooperation in an Extensive Game
Subgame Perfect Cooperation in an Extensive Game Parkash Chander * and Myrna Wooders May 1, 2011 Abstract We propose a new concept of core for games in extensive form and label it the γ-core of an extensive
More informationYao s Minimax Principle
Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,
More informationTwo-Dimensional Bayesian Persuasion
Two-Dimensional Bayesian Persuasion Davit Khantadze September 30, 017 Abstract We are interested in optimal signals for the sender when the decision maker (receiver) has to make two separate decisions.
More informationLecture 23: April 10
CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 23: April 10 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They
More informationIn Discrete Time a Local Martingale is a Martingale under an Equivalent Probability Measure
In Discrete Time a Local Martingale is a Martingale under an Equivalent Probability Measure Yuri Kabanov 1,2 1 Laboratoire de Mathématiques, Université de Franche-Comté, 16 Route de Gray, 253 Besançon,
More informationBest-Reply Sets. Jonathan Weinstein Washington University in St. Louis. This version: May 2015
Best-Reply Sets Jonathan Weinstein Washington University in St. Louis This version: May 2015 Introduction The best-reply correspondence of a game the mapping from beliefs over one s opponents actions to
More informationQuadrant marked mesh patterns in 123-avoiding permutations
Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department
More informationmonotone circuit value
monotone circuit value A monotone boolean circuit s output cannot change from true to false when one input changes from false to true. Monotone boolean circuits are hence less expressive than general circuits.
More informationYou Have an NP-Complete Problem (for Your Thesis)
You Have an NP-Complete Problem (for Your Thesis) From Propositions 27 (p. 242) and Proposition 30 (p. 245), it is the least likely to be in P. Your options are: Approximations. Special cases. Average
More informationExtender based forcings, fresh sets and Aronszajn trees
Extender based forcings, fresh sets and Aronszajn trees Moti Gitik August 31, 2011 Abstract Extender based forcings are studied with respect of adding branches to Aronszajn trees. We construct a model
More informationPh.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017
Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.
More informationMaximum Contiguous Subsequences
Chapter 8 Maximum Contiguous Subsequences In this chapter, we consider a well-know problem and apply the algorithm-design techniques that we have learned thus far to this problem. While applying these
More informationOption Pricing. Chapter Discrete Time
Chapter 7 Option Pricing 7.1 Discrete Time In the next section we will discuss the Black Scholes formula. To prepare for that, we will consider the much simpler problem of pricing options when there are
More informationInterpolation of κ-compactness and PCF
Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has
More informationCook s Theorem: the First NP-Complete Problem
Cook s Theorem: the First NP-Complete Problem Theorem 37 (Cook (1971)) sat is NP-complete. sat NP (p. 113). circuit sat reduces to sat (p. 284). Now we only need to show that all languages in NP can be
More information4 Martingales in Discrete-Time
4 Martingales in Discrete-Time Suppose that (Ω, F, P is a probability space. Definition 4.1. A sequence F = {F n, n = 0, 1,...} is called a filtration if each F n is a sub-σ-algebra of F, and F n F n+1
More informationGUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019
GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)
More informationBest response cycles in perfect information games
P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski
More informationThe Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer. Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis
The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis Seller has n items for sale The Set-up Seller has n items
More informationarxiv: v1 [math.lo] 24 Feb 2014
Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei
More informationIntroduction to Probability Theory and Stochastic Processes for Finance Lecture Notes
Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,
More informationAnother Variant of 3sat
Another Variant of 3sat Proposition 32 3sat is NP-complete for expressions in which each variable is restricted to appear at most three times, and each literal at most twice. (3sat here requires only that
More informationLECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS
LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to
More informationGPD-POT and GEV block maxima
Chapter 3 GPD-POT and GEV block maxima This chapter is devoted to the relation between POT models and Block Maxima (BM). We only consider the classical frameworks where POT excesses are assumed to be GPD,
More informationLecture 7: Bayesian approach to MAB - Gittins index
Advanced Topics in Machine Learning and Algorithmic Game Theory Lecture 7: Bayesian approach to MAB - Gittins index Lecturer: Yishay Mansour Scribe: Mariano Schain 7.1 Introduction In the Bayesian approach
More informationSAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59
SAT and DPLL Espen H. Lian Ifi, UiO May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, 2010 1 / 59 Normal forms Normal forms DPLL Complexity DPLL Implementation Bibliography Espen H. Lian (Ifi, UiO)
More informationSAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.
SAT and Espen H. Lian Ifi, UiO Implementation May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 1 / 59 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 2 / 59 Introduction Introduction SAT is the problem
More informationGeneralising the weak compactness of ω
Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak
More informationUnary PCF is Decidable
Unary PCF is Decidable Ralph Loader Merton College, Oxford November 1995, revised October 1996 and September 1997. Abstract We show that unary PCF, a very small fragment of Plotkin s PCF [?], has a decidable
More informationLevel by Level Inequivalence, Strong Compactness, and GCH
Level by Level Inequivalence, Strong Compactness, and GCH Arthur W. Apter Department of Mathematics Baruch College of CUNY New York, New York 10010 USA and The CUNY Graduate Center, Mathematics 365 Fifth
More informationTug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract
Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,
More informationPart 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL)
Part 3: Trust-region methods for unconstrained optimization Nick Gould (RAL) minimize x IR n f(x) MSc course on nonlinear optimization UNCONSTRAINED MINIMIZATION minimize x IR n f(x) where the objective
More informationLecture 19: March 20
CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 19: March 0 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may
More information6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2
6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 Daron Acemoglu and Asu Ozdaglar MIT October 14, 2009 1 Introduction Outline Review Examples of Pure Strategy Nash Equilibria Mixed Strategies
More informationCATEGORICAL SKEW LATTICES
CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most
More informationOn the Optimality of a Family of Binary Trees Techical Report TR
On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this
More informationMixed Strategies. Samuel Alizon and Daniel Cownden February 4, 2009
Mixed Strategies Samuel Alizon and Daniel Cownden February 4, 009 1 What are Mixed Strategies In the previous sections we have looked at games where players face uncertainty, and concluded that they choose
More information2 Modeling Credit Risk
2 Modeling Credit Risk In this chapter we present some simple approaches to measure credit risk. We start in Section 2.1 with a short overview of the standardized approach of the Basel framework for banking
More informationThe Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d)
The Traveling Salesman Problem We are given n cities 1, 2,..., n and integer distances d ij between any two cities i and j. Assume d ij = d ji for convenience. The traveling salesman problem (tsp) asks
More informationHandout 4: Deterministic Systems and the Shortest Path Problem
SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas
More information1 Appendix A: Definition of equilibrium
Online Appendix to Partnerships versus Corporations: Moral Hazard, Sorting and Ownership Structure Ayca Kaya and Galina Vereshchagina Appendix A formally defines an equilibrium in our model, Appendix B
More informationMartingale Pricing Theory in Discrete-Time and Discrete-Space Models
IEOR E4707: Foundations of Financial Engineering c 206 by Martin Haugh Martingale Pricing Theory in Discrete-Time and Discrete-Space Models These notes develop the theory of martingale pricing in a discrete-time,
More informationBrief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus
University of Cambridge 2017 MPhil ACS / CST Part III Category Theory and Logic (L108) Brief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus Andrew Pitts Notation: comma-separated
More informationVariations on a theme by Weetman
Variations on a theme by Weetman A.E. Brouwer Abstract We show for many strongly regular graphs, and for all Taylor graphs except the hexagon, that locally graphs have bounded diameter. 1 Locally graphs
More informationarxiv: v1 [math.co] 31 Mar 2009
A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of
More informationTABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC
TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known
More informationThe finite lattice representation problem and intervals in subgroup lattices of finite groups
The finite lattice representation problem and intervals in subgroup lattices of finite groups William DeMeo Math 613: Group Theory 15 December 2009 Abstract A well-known result of universal algebra states:
More informationContinuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals
Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität
More informationPalindromic Permutations and Generalized Smarandache Palindromic Permutations
arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,
More informationA Translation of Intersection and Union Types
A Translation of Intersection and Union Types for the λ µ-calculus Kentaro Kikuchi RIEC, Tohoku University kentaro@nue.riec.tohoku.ac.jp Takafumi Sakurai Department of Mathematics and Informatics, Chiba
More informationA class of coherent risk measures based on one-sided moments
A class of coherent risk measures based on one-sided moments T. Fischer Darmstadt University of Technology November 11, 2003 Abstract This brief paper explains how to obtain upper boundaries of shortfall
More informationLECTURE 2: MULTIPERIOD MODELS AND TREES
LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world
More informationTHE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES
THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES FU LIU AND BRIAN OSSERMAN Abstract. We study pure-cycle Hurwitz spaces, parametrizing covers of the projective line having only one ramified point
More informationFractional Graphs. Figure 1
Fractional Graphs Richard H. Hammack Department of Mathematics and Applied Mathematics Virginia Commonwealth University Richmond, VA 23284-2014, USA rhammack@vcu.edu Abstract. Edge-colorings are used to
More informationFinding Equilibria in Games of No Chance
Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk
More informationSilver type theorems for collapses.
Silver type theorems for collapses. Moti Gitik May 19, 2014 The classical theorem of Silver states that GCH cannot break for the first time over a singular cardinal of uncountable cofinality. On the other
More informationCumulants and triangles in Erdős-Rényi random graphs
Cumulants and triangles in Erdős-Rényi random graphs Valentin Féray partially joint work with Pierre-Loïc Méliot (Orsay) and Ashkan Nighekbali (Zürich) Institut für Mathematik, Universität Zürich Probability
More informationAn Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking
An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking Mika Sumida School of Operations Research and Information Engineering, Cornell University, Ithaca, New York
More informationA No-Arbitrage Theorem for Uncertain Stock Model
Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe
More informationDEPTH OF BOOLEAN ALGEBRAS SHIMON GARTI AND SAHARON SHELAH
DEPTH OF BOOLEAN ALGEBRAS SHIMON GARTI AND SAHARON SHELAH Abstract. Suppose D is an ultrafilter on κ and λ κ = λ. We prove that if B i is a Boolean algebra for every i < κ and λ bounds the Depth of every
More informationAssortment Optimization Over Time
Assortment Optimization Over Time James M. Davis Huseyin Topaloglu David P. Williamson Abstract In this note, we introduce the problem of assortment optimization over time. In this problem, we have a sequence
More informationTrust Region Methods for Unconstrained Optimisation
Trust Region Methods for Unconstrained Optimisation Lecture 9, Numerical Linear Algebra and Optimisation Oxford University Computing Laboratory, MT 2007 Dr Raphael Hauser (hauser@comlab.ox.ac.uk) The Trust
More informationEquilibrium payoffs in finite games
Equilibrium payoffs in finite games Ehud Lehrer, Eilon Solan, Yannick Viossat To cite this version: Ehud Lehrer, Eilon Solan, Yannick Viossat. Equilibrium payoffs in finite games. Journal of Mathematical
More informationPhilipp Moritz Lücke
Σ 1 -partition properties Philipp Moritz Lücke Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn http://www.math.uni-bonn.de/people/pluecke/ Logic & Set Theory Seminar Bristol, 14.02.2017
More informationarxiv: v2 [math.lo] 13 Feb 2014
A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the
More informationMTH6154 Financial Mathematics I Interest Rates and Present Value Analysis
16 MTH6154 Financial Mathematics I Interest Rates and Present Value Analysis Contents 2 Interest Rates and Present Value Analysis 16 2.1 Definitions.................................... 16 2.1.1 Rate of
More informationThe Value of Information in Central-Place Foraging. Research Report
The Value of Information in Central-Place Foraging. Research Report E. J. Collins A. I. Houston J. M. McNamara 22 February 2006 Abstract We consider a central place forager with two qualitatively different
More information